• Home
  • Authentication
    • List of Articles Authentication

      • Open Access Article

        1 - Face Detection based on Semantic Model for Mobile Banking
        leili nosrati Amir Massoud Bidgoli hamid hajseiedjavadi
        In this paper, a new authentication protocol for online banking based on the semantic model of features extracted from people's image is introduced. The proposed approach is presented using smart mobile phones for online digital imaging for customers. In this work, a fu More
        In this paper, a new authentication protocol for online banking based on the semantic model of features extracted from people's image is introduced. The proposed approach is presented using smart mobile phones for online digital imaging for customers. In this work, a fuzzy clustering has been used to categorize the characteristics of the images of different people and by applying them to different machine learning methods, a combined technique of machine learning classification methods has been presented to improve performance and increases strength against various attacks. Also to reduce the complexity of machine design for operational tasks, the technique of reducing features extracted from face images with the help of genetic algorithm has been used. In the last part, in order to make a decision for authentication selected by machine learning systems, a fuzzy logic system is presented based on the highest accuracy of identifying the desired person. Using a public dataset, the experimental results showed that the genetic algorithm-based technique is the best feature selection to create an implicit authentication method for the smartphone environment. The results showed an accuracy of about 99.80% using only 30 features out of 77 to authenticate users. At the same time, the results showed that the proposed method has a lower error rate compared to the related work. Manuscript profile
      • Open Access Article

        2 - Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
        Olayemi Olaniyi Ameh Ameh Lukman Ajao Omolara Lawal
      • Open Access Article

        3 - Improving the security of wireless sensor networks using Game Theory
        Behzad Seif mohammad goodarzi
      • Open Access Article

        4 - Molecular Identification of Gelatin Origin in Pastilles and Jelly Products Collected from Tehran Markets
        N. Kamandi M. Ghobadi Dana M. Ghavami
      • Open Access Article

        5 - A New Protocol for Lightweight Anonymous Authentication with Leading Security in Wireless Sensor Networks Based on IoT
        Maryam Rajabzadeh Asaar Pouya Derakhshan Barjoei
        Abstract: Due to the fact that this research was aimed at providing a lightweight protocol, therefore, by checking and analyzing, we will show that the protocol proposed in this research is superior to the protocols of Fotuhi and colleagues in some aspects of security a More
        Abstract: Due to the fact that this research was aimed at providing a lightweight protocol, therefore, by checking and analyzing, we will show that the protocol proposed in this research is superior to the protocols of Fotuhi and colleagues in some aspects of security and computing[1]. The proposed protocol will be reviewed and shown, as claimed. It was found that the proposed protocol has both the characteristic of being lightweight and the characteristic of advanced security. By analyzing the security of the protocol, we showed that their proposed protocol is resistant to malicious port and asynchrony attacks. Introduction The Internet of Things includes an interconnected network that enables various types of communication and plays a critical role in the development of smart services to support and improve the activities of individuals and society. One of the most important concerns of those who use wireless networks is access information through the public channel considering security and privacy. Authentication is therefore important so that no entity, person, or non-virtual device can abuse the network and by maintaining the privacy of users who are using the network. Important information does not reach these people. Method We presented a protocol that, in addition to the mentioned features, it also has the feature of two-way authentication. The proposed protocol model consists of three main components which all three entities have already been approved at the registration stage and can communicate with each other to verify their identity. The overall goal is for both the user and the sensor to verify each other's authorization, which is verified by the gateway. This protocol is safe against attacks and finally compared the proposed protocol with the previous and based protocol. Results our outcomes from the proposed method showed that the proposed protocol is 24% in computing overhead and 26% Improves telecommunication overhead. Discussion In this research, an attempt was made to provide a protocol that would bring sufficient security requirements without the use of a smart card. Also, unauthorized users cannot access the protocol stages by ways such as repetition attacks, identity forgery, lack of synchronization between the sensor and the user, the ability to track and capture the sensor. Manuscript profile
      • Open Access Article

        6 - LRAPM: A Lightweight RFID Authentication Protocol for MIoT Systems
        Alireza Abdollahi Mahdi Sajadieh Mohammad Rohollah Yazdani
        In recent years, the Internet of Things (IoT) networks have extensively been used in various practical field, one of the most important of which is medical Internet of Things (MIoT). In these networks, radio frequency identification (RFID) is one of the main technologie More
        In recent years, the Internet of Things (IoT) networks have extensively been used in various practical field, one of the most important of which is medical Internet of Things (MIoT). In these networks, radio frequency identification (RFID) is one of the main technologies in creating an authentication system that is able to efficiently identify and identify medical equipment and patients. Therefore, researchers in this field have proposed different authentication protocols for RFID-based MIOT systems and claimed that they are resistant to active and passive attacks. Contrary to their claims, most of these protocols are not resistant to conventional attacks. Fan et al. have recently proposed a lightweight RFID authentication scheme for cloud-based RFID health-care systems and claimed that it is sufficiently efficient and secure. In this paper , we analyzed the Fan et al protocole and demonstrated that their protocol is vulnerable to replay, reader impersonation, tag tracking, and de-synchronization attacks. Moreover, we show how the similarity of some of their protocol messages causes attack. Then, we propose an improved protocol (LRAMP) that is resistant to these and other known attacks in RFID authentication protocol. According to security analysis, we can see that the LRAPM protocol has a high level of security. This high security can only be achieved by adding a new message and changing other messages. A comparison of the performance of the LRAPM protocol shows that this protocol is comparable to similar protocols in terms of computational costs, storage costs and communication costs. Manuscript profile
      • Open Access Article

        7 - A Heuristic Model for SQL Injection Attacks Prevention in GIS Web Application
        Mohammad Ali Arasteh Fahimeh Parsaei
        By increasing the development of Geographical Information Systems (GIS) providing electronic map data exchange with internet and mobile applications, related problems such as keeping secure map information, safe transactions, and assured broadcast services are necessary More
        By increasing the development of Geographical Information Systems (GIS) providing electronic map data exchange with internet and mobile applications, related problems such as keeping secure map information, safe transactions, and assured broadcast services are necessary. Every year millions of attacks on financial and data information will be caused a series of problems in the world. One of the most critical attacks on the application level is SQL injection into the Web database. This paper tried to present a model for preventing SQL injection into GIS applications, which leads to fetching and manipulating the map information and data from a database. It also provides solutions for IT managers to keep the GIS website secure. The model security steps were tested on one of the GIS portals of Iranian organizations. To evaluate the performance of the proposed model, the security of an Iranian web GIS was checked before and after the announcement of the instructions, and the test results of the vulnerability checking with Acunetix and DVWA. The result showed that the website was completely safe and the model’s instructions for various stakeholders, including programmers, administrators, and GIS experts can significantly prevent this attack. Manuscript profile
      • Open Access Article

        8 - SMAK-IOV: Secure Mutual Authentication Scheme and Key Exchange Protocol in Fog Based IoV
        Yashar Salami Vahid Khajehvand
      • Open Access Article

        9 - MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
        Soheila Mirzagholi Karim Faez
      • Open Access Article

        10 - Authentication and identification of food adulterants based on fingerprinting techniques and chemometric tools (Review Article)
        E. Sarlaki M. Aboonajmi
        Authentication is an important issue in quality control, hygiene, and safety of food products. Detection and identification of food adulterants require the development of novel and effective analytical methods for verification of composition, quality and authenticity to More
        Authentication is an important issue in quality control, hygiene, and safety of food products. Detection and identification of food adulterants require the development of novel and effective analytical methods for verification of composition, quality and authenticity to ensure food safety and consumer satisfaction. Fingerprinting techniques involve chromatographic fingerprinting, electrophoretic fingerprinting, spectroscopic fingerprinting, and electronic sensor fingerprinting. Liquid chromatography (LC), gas chromatography (GC), near-infrared (NIR) spectroscopy, mid-infrared (MIR) spectroscopy, Raman spectroscopy, hyperspectral imaging (HSI) and nuclear magnetic resonance spectroscopy (NMR) are already common techniques and they will utilize to food fraud prevention. NIR, MIR and Raman spectroscopic techniques, as well as sensor-based fingerprinting (E-Nose, E-Tongue and E-Eye), have the great advantage of providing fast, high throughput, and non-destructive analyses with limited costs. Food fingerprinting combined with chemometric techniques represents a valuable tool for fraud detection and control of food products. This review paper details the fingerprinting techniques applied in the detection and identification of adulteration to obtain food fingerprints, emphasizing the advantages and drawbacks of each technique, as well as review and discuss the reported studies in which these techniques have been applied in the area of food authentication. Manuscript profile
      • Open Access Article

        11 - Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
        Ali AliBabaee Ali Broumandnia
      • Open Access Article

        12 - Identification of Adulterated Sausage Products by Pork using FTIR and GC-MS Combined with Chemometrics
        Mustofa Ahda Any Guntarti Aprilia Kusbandari Hindami Andoyo Nugroho
      • Open Access Article

        13 - Beginning of Im§m AlÊ (PBUH) Caliphate: Retrieving and Authentication of Al-Ya’qåbÊ’s Narrations
        Somayeh Amin Roaya Jazeh
        Tarikh Al-Ya’qubi, written by Ahmad ibn Abi Ya’qub (d. 284 AH), is one of the general histories that has been compiled in a combined method; that is it presents a whole coherent account of a historical event by removing the chain of narrator as well as integrating sever More
        Tarikh Al-Ya’qubi, written by Ahmad ibn Abi Ya’qub (d. 284 AH), is one of the general histories that has been compiled in a combined method; that is it presents a whole coherent account of a historical event by removing the chain of narrator as well as integrating several records of a same event. There are some factors in Tarikh Al-Ya’qubi that make it necessary to retrieve its resources as well as authentication of its narrations: the removal of the chain of narrator, the inconsistency of some reports with the accounts of other well-known contemporary resources (Al-Tabaqat Al-Kubra by Ibn-Sa’d, Tarikh Khalifa Khayyat Ibn Qutaybah’s, Al-Imamah Wa al Siyasah, etc) as well as subsequent authentic (Al- Fotuh Ibn- A’tham, Al-Isti’ab by Ibn Abd Al-Barr, Sharh Nahj Al- Balaghah by Ibn Abi Al-Hadid, etc) and specifically including unheard and Shiite narrations. The main questions of this research include: What are the sources of Tarikh Al-Ya’qubi? Are they sufficiently credible? And most importantly, what was Al-Ya’qubi’s criteria in authenticating the narrations? According to the research findings, although Al-Ya’qubi’s accounts on The year, month and day of Uthman, The first to pledge allegiance (Talha), etc are valid and in line with other sources, his history -influenced by his Shiite attitudes or other unknown factors- sometimes includes different and rare accounts as allegiance of all people by Ali except three people Quraysh, The role of five representatives of Ansar in allegiance by Ali, etc, the resource of which is not known. Manuscript profile